NA

CVE-2022-33891

Published: 18/07/2022 Updated: 02/08/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and previous versions, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache spark

Exploits

This Metasploit module exploits an unauthenticated command injection vulnerability in Apache Spark Successful exploitation results in remote code execution under the context of the Spark application user The command injection occurs because Spark checks the group membership of the user passed in the ?doAs parameter by using a raw Linux command I ...

Github Repositories

Apache Spark RCE

cve-2022-33891 Apache Spark RCE

CVE-2022-33891 Exploit For Apache Spark

CVE-2022-33891 Apache Spark Vulnerability Exploit Created By : DrLinux This Exploit Run With Python Version 37 and Newer Version Of Python

CVE-2022-33891 Apache Spark Shell Command Injection Vulnerability A Python POC for exploiting the Apache Spark Shell Command Injection vulnerability Affected Versions Apache Spark versions 303 and earlier, versions 311 to 312, and versions 320 to 321 Vulnerable component localhost:8080/?doAs=`[command injection here]` Ex

cve-2022-33891 Usage: pip3 install requests # If you do not use the -d parameter, the dnslog domain name will be automatically applied for you # 如果你不使用-d参数,则会自动为您申请dnslog域名。 python3 cve_2022_33891_pocpy -u 127001 python3 cve_2022_33891_pocpy -f urltxt python3 cve_2022_33891_pocpy -u 127001 -d ngpc6cdnslogcn p

EP3 - MAC0352 Redes deComputadores e Sistemas Distribuidos 2023 Tópico: CVE-2022-33891 Execução de comandos shell arbitrários em aplicação spark que utiliza autenticação via ACL Alunos Elinilson Vital Leoarndo Bozzetto CVE-2022-33891 Patch Instructions for Ubuntu 2204 Prerequisites Ubuntu 2204 Git Maven Python 3 Step

WMCTF 2022 OFFICIAL WRITE-UP Due to some special reasons, the zero solution challenge does not release the wp [TOC] PWN ctf-team_simulator This question is a "registration language" generated by compiling with flex When reversing it, you will find a large number of token tokens, from 1 to 17, respectively: #define CREATE 1 #define LOGIN 2 #define USE

CVE-2022–33891 — Apache Spark Shell Command Injection Vulnerability Impacted Versions - This security issue impacts Apache Spark versions 303 and earlier, Versions 311 to 312, Versions 320 to 321 Proof of Concept (PoC) STEP 1: Install OPENJDK of version 11 with commands – sudo apt-get update sudo apt-get install openjdk-11-jdk java -version STEP 2:

Apache Spark Command Injection PoC Exploit for CVE-2022-33891

CVE-2022-33891 PoC PoC for CVE-2022-33891, with ability to set custom payloads Not vulnerable by default; vulnerable when: /spark-submit --conf sparkaclsenable=TRUE ____ Intended Use Usage of this script is limited to personnel who are authorised to run the payload on the target hosts for vulnerability patching purposes only Prior to

Apache Spark Shell Command Injection Vulnerability

CVE-2022-33891 Apache Spark Shell Command Injection Vulnerability A Python POC for exploiting the Apache Spark Shell Command Injection vulnerability I saw some other POCs out there but they looked mega sus This one is clean and simple I did not discover this exploit/vulnerability I just wanted to make a safe POC for the community ^^ CVE originally discovered by Kostya Kort

Apache Spark RCE - CVE-2022-33891

Apache-spark-CVE-2022-33891 Apache Spark RCE - CVE-2022-33891 [PoC] Follow us Vulnmachines Platform YouTube Twitter Facebook LinkedIn

cve-2022-33891-poc

cve-2022-33891 Usage: pip3 install requests # If you do not use the -d parameter, the dnslog domain name will be automatically applied for you # 如果你不使用-d参数,则会自动为您申请dnslog域名。 python3 cve_2022_33891_pocpy -u 127001 python3 cve_2022_33891_pocpy -f urltxt python3 cve_2022_33891_pocpy -u 127001 -d ngpc6cdnslogcn p

「💥」CVE-2022-33891 - Apache Spark Command Injection

「💥」CVE-2022-33891 Description The Apache Spark UI offers the possibility to enable ACLs via the configuration option sparkaclsenable With an authentication filter, this checks whether a user has access permissions to view or modify the application If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitr

CVE-2022-33891 Apache Spark Shell Command Injection Vulnerability A Python POC for exploiting the Apache Spark Shell Command Injection vulnerability I saw some other POCs out there but they looked mega sus This one is clean and simple I did not discover this exploit/vulnerability I just wanted to make a safe POC for the community ^^ Affected Versions Apache Spark versions

<a href="sumsec.me"><img src="https://readme-typing-svg.demolab.com?font=Fira+Code&size=24&pause=1000&color=FDFDFD&background=13797800&center=true&vCenter=true&width=435&lines=%F0%9F%91%8B%EF%BC%8C%E5%83%8F%E6%B8%85%E6%B0%B4%E4%B8%80%E8%88%AC%E6%B8%85%E6%BE%88%E9%80%8F%E6%98%8E" alt="SummerSec" /></a>

🏯&nbsp;HOME 📁 Archives   📣&nbsp;About ME&nbsp;  📒Old Blog  📌&nbsp;Advertisements  🌐&nbsp;SiteMap   🗂 Resources 🔭 RSSxml 时间轴 📈 2022 📅 Time Name Tags 12/09 VMWare-Workspace-ONE-Access-Auth-Bypass 漏洞分析/Java/RCE 09/28 Spring-Framework-RCE-CVE-2022-22965漏洞分析 漏洞

𝐇𝐞𝐥𝐥𝐨 𝐭𝐡𝐞𝐫𝐞, 𝐟𝐞𝐥𝐥𝐨𝐰 &lt;𝚌𝚘𝚍𝚎𝚛𝚜/&gt;!

<a href="sumsec.me"><img src="https://readme-typing-svg.demolab.com?font=Fira+Code&size=24&pause=1000&color=FDFDFD&background=13797800&center=true&vCenter=true&width=435&lines=%F0%9F%91%8B%EF%BC%8C%E5%83%8F%E6%B8%85%E6%B0%B4%E4%B8%80%E8%88%AC%E6%B8%85%E6%BE%88%E9%80%8F%E6%98%8E" alt="SummerSec" /></a>

🏯&nbsp;HOME 📁 Archives   📣&nbsp;About ME&nbsp;  📒Old Blog  📌&nbsp;Advertisements  🌐&nbsp;SiteMap   🗂 Resources 🔭 RSSxml 时间轴 📈 2022 📅 Time Name Tags 12/09 VMWare-Workspace-ONE-Access-Auth-Bypass 漏洞分析/Java/RCE 09/28 Spring-Framework-RCE-CVE-2022-22965漏洞分析 漏洞

A PoC exploit for CVE-2022-33891 - Apache Spark UI Remote Code Execution (RCE)

CVE-2022-33891 - Apache Spark UI Remote Code Execution (RCE) 🔐 Apache Spark UI is susceptible to a remote command injection vulnerability identified as CVE-2022-33891 This flaw arises due to improper handling of user authentication and access control, specifically when Access Control Lists (ACLs) are enabled With ACLs activated through the sparkaclsenable configuration o

Certificates SQL (Advanced) Certificate SQL (Intermediate) Certificate CompTIA Network+ (N10-008) Advent of Cyber 2022 Advent of Cyber 2023 Linux CLI Basics Penetration Testing and Ethical Hacking SQL (Basic) Linux Fundamentals for Security Practitioners Fundamental Windows Security Overview OSINT Basics CVE Series: Apache Spark (CVE-2022-33891)